مطالب مرتبط با کلیدواژه

Network Security


۱.

Implementation of Intrusion detection and prevention with Deep Learning in Cloud Computing(مقاله علمی وزارت علوم)

کلیدواژه‌ها: IDPS (Intrusion Detection and Prevention System) Network Security

حوزه‌های تخصصی:
تعداد بازدید : ۳۷۳ تعداد دانلود : ۱۷۰
An administrator is employed to identify network security breaches in their organizations by using a Network Intrusion Detection and Prevention System (NIDPS), which is presented in this paper that can detect and preventing a wide range of well-known network attacks. It is now more important than ever to recognize different cyber-attacks and network abnormalities that build an effective intrusion detection system plays a crucial role in today's security. NSL-KDD benchmark data set is extensively used in literature, although it was created over a decade ago and will not reflect current network traffic and low-footprint attacks. Canadian Institute of Cyber security introduced a new data set, the CICIDS2017 network data set, which solved the NSL-KDD problem. With our approach, we can apply a variety of machine learning techniques like linear regression, Random Forest and ID3. The efficient IDPS is indeed implemented and tested in a network environment utilizing several machine learning methods. A model that simulates an IDS-IPS system by predicting whether a stream of network data is malicious or benign is our objective. An Enhanced ID3 is proposed in this study to identify abnormalities in network activity and classify them. For benchmark purposes, we also develop an auto encoder network, PCA, and K-Means Clustering. On CICIDS2017, a standard dataset for network intrusion, we apply Self-Taught Learning (STL), which is a deep learning approach. To compare, we looked at things like memory, Recall, Accuracy, and Precision.
۲.

Comparative Study of Data Transfer in SDN Network Architecture in IoT(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Internet of Things Software-Defined Networks (SDN) Network Security Mininet software

تعداد بازدید : ۳۳۹ تعداد دانلود : ۱۶۴
The Internet of Things (IoT) has gained significant attention in recent years, with the proliferation of connected devices and the need for efficient data transfer in IoT networks. Software-Defined Networking (SDN) has emerged as a promising solution to address the challenges of network management and optimization in IoT environments. This paper presents a comparative study of data transfer in SDN network architecture in IoT, focusing on the benefits, challenges, and future perspectives of integrating SDN and IoT. Given the crucial role of security in IoT, this paper seeks to access a secure architecture for computer networks to provide a solution for security challenges. To achieve this, a comparative analysis of two SDN architectures is conducted in this research. We have utilized the Miniedit software, which serves as a laboratory for software-defined networks, to implement and simulate these SDN architectures. The results of this study are based on a comparison of the two secure architectures using DITG tables. This comparative study offers valuable insights into the integration of SDN in IoT network architecture and its influence on data transfer.
۳.

Advancing Sustainability in IT by Transitioning to Zero-Carbon Data Centers(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Artificial Intelligence Network Security Autonomous Threat Response Machine Learning Cybersecurity deep learning Anomaly Detection Threat Mitigation Real-Time Security AI-Driven Systems (AI)

حوزه‌های تخصصی:
تعداد بازدید : ۶ تعداد دانلود : ۲
Cyber threats are changing constantly and these days more than 560,000 new malware varieties are launched daily, which means that rudimentary measures of protecting networks from attacks cannot be of much help in handling real time threats. Single-static security control and manual intervention are insufficient to address APTs, Zero Day, and high-volume DDoS attacks. This is where the application of AI in network security lays its foundation, where real time threat response programs become possible where they are trained to automatically identify, categorize, and mitigate highly complex attacks without requiring massive amount of time and effort. The changing role of AI in network security is examined in this work since it can contribute to the improvement of threat detection, decrease response time, and minimize reliance on human factors. This research reviews more than 150 AI-based security frameworks, and 25 case studies of different industries including finance, healthcare, telecommunications, to assess the efficiency of machine learning and deep learning algorithms for autonomous threat response. The insights show that in challenging contexts, AI-based solutions provide anomaly detection scores of up to 97%, which are far higher than those obtained by conventional systems with average scores of 80%. The response time increased up to 75% as the AI systems responded under 3 seconds during the large scale cyberattack simulation operations. Significant achievement of scalability was across networks with number of nodes more than ten thousand nodes at 90% reliability in different threat scenarios. These findings underscore the importance of AI as the cornerstone of today’s cybersecurity: delivering accurate and timely threat coverage and demonstrating high resilience to threat evolution. However, issues like, algorithm bias, ethical concerns, and resistance to adversarial perturbation calls the need for research to develop effective measures towards the longevity of banking security systems integrated with AI. This study emphasizes the importance of search for new strategies to strengthen current digital environments against the increasing number of threats.
۴.

Artificial Intelligence in Network Security with Autonomous Threat Response Systems(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Artificial Intelligence Network Security Autonomous Systems Machine Learning (ML) Deep Learning (DL) Threat Detection cyberattacks Threat Mitigation Response time DDoS

حوزه‌های تخصصی:
تعداد بازدید : ۳ تعداد دانلود : ۲
Background: With the continued advance in cyber threats, traditional network security systems offer little returns to organizations. AI has turned out to be a useful technology in improving network security because it proactively identifies and responds to threats in a short time. Objective: This article seeks to discuss the role played by AI self-defending mechanisms in autonomous network security given their effectiveness in threat detection, response time, and the overall harm that can be caused to networks by cyber criminals. Methods: Three separate studies were made, including conventional security systems, and analytically compared them with the AI-driven system across 100 different network environments. Machine learning (ML), deep learning (DL), and other forms of AI were applied to identify and counteract distinct threats like viruses, phishing, and even DDoS attacks. Detecting accuracy, response time and ability to mitigate attacks where among some of the other factors that were examined. Results: Automated threat intelligence systems have a 92% accuracy while legacy systems only have 78%. Mean response time was also decreasing by 65% from 45 seconds to 15 seconds. A significant increase to attack mitigation rates was noted with fifty percent effectiveness of the AI programs averting 85 percent of the threats in the first 30 seconds of identification. Conclusion: Autonomous threat response systems substantiate AI, which function as a radically superior replacement to conventional network security structures, minimizing threat response time and boosting the overall threat neutralization outcome. Incorporation of these types of secure mechanisms into contemporary security landscapes is important as a means of counteraction against new forms of cyber threats.
۵.

Cybersecurity in the Age of Quantum Computing New Challenges and Solutions(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Quantum Key Distribution 5G networks Cryptographic Resilience Network Security Hybrid QKD Optical Backbone Wireless Topologies Standardization Key Generation Rate Cybersecurity

حوزه‌های تخصصی:
تعداد بازدید : ۵ تعداد دانلود : ۲
Background: Mobile networks today specifically 5G require appreciable secure networks because of the emerging risks due to the growth in the deployment of network structures. Discovered weaknesses of cryptographic conventional methods to quantum computing breakthroughs make it necessary to develop quantum-resistant solutions. Objective: The article analysing Quantum Key Distribution (QKD) protocols in improving cryptographic performance in 5G networking environment, with emphasis on incorporating QKD into 5G network designs. Methods: The study performed both a systematic literature review and an evaluation of current QKD deployments, as well as a qualitative assessment of data derived from 20 key informant interviews on QKD in telecommunications and 15 technical reports. Latency and key generation rate experiments were both conducted with relay mechanisms including both trusted and untrusted optical fiber and wireless relay links, in addition to integration issues were explored using simulations over fiber and wireless emulated networks. Results: The outcomes emphasise that QKD brings radically enhanced key security in conjunction with low delay and high rate within integrated 5G architectures. Hybrid relay-based QKD augmented key generation rates by 23 % in comparison with previous techniques. There are also concerns associated with the implementation of internationally agreed on standards which include issues pertaining to non-compliance of the standards used in different countries and high costs involved when trying to implement these standards. Conclusion: QKD implementation also increases cryptographic protection of the 5G networks and makes infrastructures quantum-immune to threats originating from the quantum-age. To make it more widespread, additional standardization and a reduction in cost are required.